Empowerment Technologies - W1L2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 45

EMPOWERMENT

TECHNOLOGIES
MS. JOCEL B. PARDO
ACTIVITY 3: GALLERY WALK
Direction:
1. Images will be shown in the screen.
2. Each group will be given 2-3 minutes to write their
observation on the given images.
3. Students will share their observation about the image.
LEARNING COMPETENCIES
The learners will be able to:
• Apply online safety, security, ethics, and etiquette standards and practice
in the use of ICTs.
• Discuss what constitutes appropriate and inappropriate online behavior;
• Discern possible deceptive information and wrongly evaluated data; and
• Understand the importance of making judgment calls on possible
implications and consequences of making certain information public.
TOPIC OUTLINE

•Online Safety / Internet Safety


•Online Threats and Types
•Online Safety Measures
•Online Ethics and Netiquette
ONLINE SAFETY
How safe are you?
ONLINE SAFETY
• Practices and precautions that should be observed when using
the internet to ensure that the users as well as their computers
and personal information are safe from crimes associated with
using the internet.
• Numerous delinquencies that can be committed on the internet:
* Stalking
* Identity theft
* Privacy violations
* Harassment
ONLINE SAFETY MEASURES
• Never give any personal information out about yourself
over the internet.
• Do not give any banking or sensitive information unless
you are sure that it is a reputable business having a secure
service. To make sure that you are in a secured network,
the website address should begin with “https://” as
opposed to “http://.” Never access your accounts by
following an email link, instead type the URL by yourself.
ONLINE SAFETY MEASURES
• Never open messages or attachments from someone you
do not know.
• Do not give any banking or sensitive information unless
you are sure that it is a reputable business having a secure
service. To make sure that you are in a secured network,
the website address should begin with “https://” as
opposed to “http://.” Never access your accounts by
following an email link, instead type the URL by yourself.
ONLINE SAFETY MEASURES
• Regularly review your privacy settings in your online
accounts to make sure you are not sharing important
personal information.
• When using a public computer terminal, be sure to delete
your browsing data before leaving.
• Keep your software updated to avoid security holes.
• Do not download or install software or anything on your
computer or cellphone that is unknown to you.
ONLINE THREATS
DEFINITION & TYPES OF THREATS
ONLINE THREATS

• An act performed by a knowledgeable computer


user sometimes referred to as hacker that illegally
browses or someone’s information.
TYPES OF THREATS
PHISHING
an email sent from an internet criminal disguised as
an email from a legitimate, trustworthy source. The
message is meant to lure you into revealing sensitive
or confidential information.
PHISHING
TYPES OF THREATS
PHARMING
a malicious website that resembles a legitimate
website, used to gather usernames and passwords.
PHARMING
TYPES OF THREATS
INTERNET SCAM
A type of scam that misleads the user in many ways
attempting to take lead of them.
The purpose of this scam is to cheat the target of
their personal property directly rather than private
information through fabricated promises, confidence
tricks and many more.
INTERNET
SCAM
TYPES OF THREATS
MALWARE
A generic term for spyware and adware.
A malicious software disguised as real software often
secretly installed, intended to transfer and gather
private information, like passwords, without the
user’s permission.
TYPES OF THREATS
MALWARE
Adware – short term for advertising supported
software. It is a type of malware that automatically
delivers advertisements.
Example: Banner Ads & Pop-up Ads.
TYPES OF THREATS
MALWARE
Spyware – a type of malware that functions by spying
on user activity without their knowledge.
These spying capabilities can include activity
monitoring, collecting keystrokes, data harvesting
(account information, logins, financial data), and more.
Example: Keylogger
VIRUS & WORM
Virus – a program designed to replicate by attaching
itself into other computer programs, data files, or the
boot sector of the hard drive.
Worm – can be injected into a network by any types
of means, like a USB stick or an email attachment
VIRUS & WORM
Trojan Horse – known as a “Trojan,” a type of malware
that disguises itself as a normal file or program to trick
users into downloading and installing malware.
Iloveyou Virus – known as Love bug or love letter.
A computer worm attached on email that have infected 10
million of windows personal computer shutdown and
deletion of files on the year 2000.
Created by a Filipino student: Onel De Guzman and
Reonel Ramones.
VIRUS & WORM

Love
Letter
VIRUS & WORM

Virus
Infection on
a Flash Drive
OTHER TYPES OF THREATS
• Computer Bug
• Cyber Stalking
• Cyber Bullying
• Cyber Harassment
• Spam
• Spoofing
OTHER TYPES OF THREATS
• Computer Bug
• Cyber Stalking
• Cyber Bullying
• Cyber Harassment
• Spam
• Spoofing
NETIQUETTE
• Comes from the word Network and Etiquette.
• Set of rules and norms for acceptable conduct
or behavior online.
COMPUTER ETHICS
• Concerned with how computing professionals
should make decisions regarding professional
and social conduct.
CORE RULES
OF
NETIQUETTE
PRIVACY
• Refers to the right of individuals to deny or
restrict the collection and used of information
about them.
HOW DO WE MAINTAIN
OUR PRIVACY?
AUTHENTICATION

• Process where users verifies their identity.


• Deals with the problem of determining
whether a user should be allowed access to a
particular system.
AUTHENTICATION

Four commonly authentication methods:


• User identification – something you know
• Possessed objects – something you have
• Biometric device – something you are
• Callback system
USER IDENTIFICATION
POSSESSED OBJECTS
BIOMETRIC DEVICE

You might also like